Vulnerability Description
PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the "subnet" parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpipam | Phpipam | 1.4.4 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/165683/PHPIPAM-1.4.4-SQL-Injection.htmlExploitThird Party AdvisoryVDB Entry
- https://fluidattacks.com/advisories/mercury/ExploitThird Party Advisory
- https://github.com/phpipam/phpipam/releases/tag/v1.4.5Release NotesThird Party Advisory
- http://packetstormsecurity.com/files/165683/PHPIPAM-1.4.4-SQL-Injection.htmlExploitThird Party AdvisoryVDB Entry
- https://fluidattacks.com/advisories/mercury/ExploitThird Party Advisory
- https://github.com/phpipam/phpipam/releases/tag/v1.4.5Release NotesThird Party Advisory
FAQ
What is CVE-2022-23046?
CVE-2022-23046 is a vulnerability with a CVSS score of 7.2 (HIGH). PhpIPAM v1.4.4 allows an authenticated admin user to inject SQL sentences in the "subnet" parameter while searching a subnet via app/admin/routing/edit-bgp-mapping-search.php
How severe is CVE-2022-23046?
CVE-2022-23046 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-23046?
Check the references section above for vendor advisories and patch information. Affected products include: Phpipam Phpipam.